A blue …show more content…
She wanted to prove that she could create a collection of computer software that would remain undetectable (Vaas, 2007). How did it work? It manipulated registers, input/output, and registers, among other processes, for virtual operations at the hardware level (Beaver, 2016). It exploited the fact that the virtualization technology was vulnerable, and entered the system through administrative access. When users installed a new version of Windows, they usually installed many programs and services of which they were not aware (South University Online, 2016). The ‘Blue Pill’ took advantage of this vulnerability and infected the virtual system. Therefore, in a business setting, it is best to have the system administrators control the installation and upgrades of any software to the system because they will be more aware of any system …show more content…
However, in order to understand what the malware does, it is necessary to understand the working of the computer system. At the core of the system is the kernel, or nucleus. This is a computer program that is the core of the system. It controls everything in the system and is the first program loaded at the startup (Rouse, 2016). It is normally loaded into a protected area of memory and takes requests from the software and translates it for use by the